Description
Apache Qpid AMQP 0-x JMS client before 6.0.4 and JMS (AMQP 1.0) before 0.10.0 does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized object in a JMS ObjectMessage that is handled by the getObject function.
Remediation
References
http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.html
https://issues.apache.org/jira/browse/QPIDJMS-188
http://qpid.apache.org/components/jms/security.html
http://qpid.apache.org/components/jms/security-0-x.html
http://www.securityfocus.com/bid/91537
http://www.securitytracker.com/id/1036239
http://www.securityfocus.com/archive/1/538813/100/0/threaded
Related Vulnerabilities
CVE-2020-9488 Vulnerability in maven package org.apache.logging.log4j:log4j-core
CVE-2019-15478 Vulnerability in npm package status-board
CVE-2019-1003033 Vulnerability in maven package org.jenkins-ci.plugins:groovy
CVE-2019-1003026 Vulnerability in maven package org.jenkins-ci.plugins:mattermost
CVE-2017-7664 Vulnerability in maven package org.apache.openmeetings:openmeetings-server